Back to Results
First PageMeta Content



Formal analysis of protocols based on TPM state registers St´ephanie Delaune∗ and Steve Kremer∗ and Mark D. Ryan† and Graham Steel∗ ∗ LSV, ENS Cachan & CNRS & INRIA Saclay Ile-de-France ˆ † School of Comput
Add to Reading List

Document Date: 2011-05-05 05:25:30


Open Document

File Size: 217,50 KB

Share Result on Facebook

Company

Graham Steel / Microsoft / Trusted Computing Group / /

Country

France / /

Event

FDA Phase / /

Facility

To store / University of Birmingham / /

IndustryTerm

security chip / resolution algorithms / secure envelope protocol / envelope protocol / dedicated resolution algorithm / security protocol analysis tools / secure systems / protocol analysis tool / secure applications / optimistic fair exchange protocols / search space / security protocols / software process / digital envelope protocol / /

Organization

School of Computer Science / University of Birmingham / /

Person

Once Alice / Mark D. Ryan / Ritter / Steve Kremer / /

Position

model global state / model / /

Product

ProVerif / Bitlocker / Section II / using ProVerif / Microsoft Bitlocker / /

Technology

encryption / real Bitlocker protocol / PCRbased protocol / second protocol / DAA protocol / application program interface / envelope protocol / BitLocker protocol / analysing security protocols / public key / API / optimistic fair exchange protocols / disk encryption / dedicated resolution algorithm / encryption system / digital envelope protocol / resolution algorithms / secret key / security chip / secure envelope protocol / drive encryption / public key encryption / /

SocialTag